Unit III Access Control and Security
Unit III Access Control and Security
Policy server:
Based on the AR’s posture and an enterprise’s defined policy, the policy server
determines what access should be granted. The policy server often relies on backend systems,
including antivirus, patch management, or a user directory, to help determine the host’s
condition.
Encryption Authentication
algorithm algorithm
IPSec Services
Domain of
interpretation
CCS354 NETWORK SECURITY 11 UNIT III ACCESS CONTROL AND SECURITY
Key management
1. IPSec provides security services at the IP layer by enabling a system to select required
security protocols, determine the algorithm(s) to use for the service(s), and put in place any
cryptographic keys required to provide the requested services.
2. Two protocols are used to provide security: an authentication protocol designated by the
header of the protocol, Authentication Header (AH); and a combined encryption/
authentication protocol designated by the format of the packet for that protocol,
Encapsulating Security Payload (ESP). RFC 4301 lists the following services:
1. Access control
2. Connectionless integrity
3. Data origin authentication
4. Rejection of replayed packets (a form of partial sequence integrity)
5. Confidentiality (encryption)
6. Limited traffic flow confidentiality
IPSec protocol suit:
1. IP Packet consists of two parts, IP Header and Data. IPSec features are incorporated into an
additional IP Header called extension Header. Different Extension Header is used for
different services.
IPSec
2. IPSec defines two protocol
1. AH
2. ESP
TRANSPORT MODE:
AH and ESP can support two modes of operation.
1. Transport mode
2. Tunnel mode
1. Transport mode provides protection primarily for upper-layer protocols. That is, transport
mode protection extends to the payload of an IP packet. Examples include a TCP or UDP
segment or an ICMP packet.
2. The transport mode is used for end-to-end communication between two hosts (e.g., a client
and a server, or two workstations).
3. ESP in transport mode encrypts and optionally authenticates the IP payload but not the IP
header.
4. AH in transport mode authenticates the IP payload and selected portions of the IP header.
TUNNEL MODE:
1. Tunnel mode provides protection to the entire IP packet. To achieve this, after the AH or ESP
fields are added to the IP packet, the entire packet plus security fields is treated as the
payload of new outer IP packet with a new outer IP header.
2. The entire original, inner, packet travels through a tunnel from one point of an IP network to
another; no routers along the way are able to examine the inner IP header. Because the
original packet is encapsulated, the new, larger packet may have totally different source and
destination addresses.
3. Tunnel mode is used when one or both ends of a security association (SA) are a security
gateway, such as a firewall or router that implements IPsec.
4. With tunnel mode, a number of hosts on networks behind firewalls may engage in secure
communications without implementing IPsec. The unprotected packets generated by such
hosts are tunneled through external networks by tunnel mode SAs set up by the IPsec
software in the firewall or secure router at the boundary of the local network.
5. ESP in tunnel mode encrypts and optionally authenticates the entire inner IP packet,
including the inner IP header.
6. AH in tunnel mode authenticates the entire inner IP packet and selected portions of the outer
IP header.
Table 19.1 summarizes transport and tunnel mode functionality.
1. Next Header (8 bits): Identifies the type of header immediately following this header.
2. Payload Length (8 bits): Length of Authentication Header in 32-bit words, minus 2. For
example, the default length of the authentication data field is 96 bits, or three 32-bit words.
With a three-word fixed header, there are a total of six words in the header, and the Payload
Length field has a value o
AH Transport Mode:
1. The position of the AH is between the original IP header and original TCP header of the IP
packet.
2. Figure shows the AH in transport mode
AH Tunnel Mode:
1. The entire original IP packet is authenticated.
Padding
The Padding field serves several purposes:
1. To expand the plain text If an encryption algorithm requires the plaintext to be a multiple of
some number of bytes
2. To assure the alignment of cipher text to make it integer multiple of 32-bits.
3. Additional padding may be added to provide partial traffic-flow confidentiality by
concealing the actual length of the payload.
4. Several approaches to combining authentication and confidentiality. ESP is used with its
authentication option
1. First apply ESP then append the authentication data field
2. Authentication applies to cipher text rather than plaintext
1. The key management is related to determination and distribution of secret keys. A typical
requirement is four keys for communication between two applications: transmit and receive
pairs for both integrity and confidentiality.
2. The IPsec Architecture document mandates support for two types of key management:
1. Manual: A system administrator manually configures each system with its own keys
and with the keys of other communicating systems. This is practical for small,
relatively static environments.
2. Automated: An automated system enables the on-demand creation of keys for SAs
and facilitates the use of keys in a large distributed system with an evolving
configuration.
3 It uses two protocols:
Oakley Key Determination Protocol:
Internet Security Association and Key Management Protocol (ISAKMP):
. Step: 1
IKE
Step: 2
AH/ESP
Operations
Three different authentication methods can be used with IKE key determination:
Digital signatures: The exchange is authenticated by signing a mutually obtainable hash;
each party encrypts the hash with its private key. The hash is generated over important
parameters, such as user IDs and nonces.
Public-key encryption: The exchange is authenticated by encrypting parameters such as IDs
and nonces with the sender’s private key.
Symmetric-key encryption: A key derived by some out-of-band mechanism can be used to
authenticate the exchange by symmetric encryption of ex-change parameters.
IKEv2 exchanges
IKEv2 Exchanges
Header and Payload Formats
IKE defines procedures and packet formats to establish, negotiate, modify, and de-lete
security associations. As part of SA establishment, IKE defines payloads for exchanging key
generation and authentication data.
Figure shows the relative location of securityfacilitiesin the Tcp/Ip protocol stack
1. Transport layer security (TLS) is a feature of mail servers designed to secure the transmission
of electronic mail from one server to another using encryption technology. TLS can reduce
the risk of eavesdropping tampering and message forgery mail communications.
2. TLS is a security protocol from the internet engineering task force (IETF) that is based on the
secure sockets layer (SSL) 3.0 protocols developed by Netscape.
3. TLS was designed to provide security at the transport layer. TLS is a non-proprietary version
of SSL. For transactions on internet, a browser needs:
1. Make sure that server belongs to the actual vendor.
2. Contents of message are not modified during transition.
3. Make sure that the imposter does not interpret sensitive information such as credit
card number.
HTTP
TLS
TCP
IP
Handshake protocol:
1. Browser sends a hello message that includes TLS version and some preferences
2. Server sends certificate messages that include the public key of the server. The public key is
certificated by some certification authority, which means that the public key is encrypted by
a CA private key. Browser has a list of CAs and their public keys. It uses the corresponding
key to decrypt the certification and finds the server public key. This also authenticates the
server because the public key is certificated by the CA.
3. Browser sends a secret key, encrypts it with a server public key and sends it to the server.
4. Bowser sends a message, encrypted by the secret key to inform the server that handshaking is
terminating from the browser key.
5. Server decrypts the secret key using it private key and decrypts the message using the secret
key. It then sends a message, encrypted by the secret key, to inform the browser that
handshaking is terminating from the server side.
SSL record protocol: It provides basic security services to various higher layer protocols.
HTTP: provides the transfer service for web client/server interaction.
SSL Handshake protocol, SSL change cipher protocol, SSL Alert protocol: Management of
exchanges.
SSL Record Protocol
1. The SSL Record protocol provides services for SSL connection
1. Confidentiality-Handshake protocol for encryption of SSL payload.
2. Message integrity-Handshake protocol for Message authentication code(MAC).
2. SSL record protocol operation is shown in fig
HTPPS
HTTPS (HTTP over SSL) refers to the combination of HTTP and SSL to im-
plement secure communication between a Web browser and a Web server.
The HTTPS capability is built into all modern Web browsers. Its use depends
on the Web server supporting HTTPS communication.
For example,
some search engines do not support HTTPS. Google provides HTTPS as an option:
https://google.com.
The principal difference seen by a user of a Web browser is that URL (uni-
form resource locator) addresses begin with https:// rather than http://. A normal
HTTP connection uses port 80. If HTTPS is specified, port 443 is used, which
invokes SSL.